You are on page 1of 32

Atharva College Of Engineering

Faculty of Electronics Engineering

Advance Networking Technologies

Lab Report

Prepared By
Diwakar Thakur
Roll No. 56
......
Instructor
Prof. Shikha S.

November 29, 2020


Contents

1 Study and Execution of Basic Networking Commands 1


1.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2 Configure a Network topology using packet tracer Software 4


2.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.4 Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Build class A Class B Network using router in packet tracer tools 7


3.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

4 Installation of Proxy-Server 11
4.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

5 Installation of Mail-Server 14
5.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

6 Installation of Web-Server 16
6.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

i
Experiment 1

Study and Execution of Basic


Networking Commands

1.1 Aim
To Study and Execution of Basic Networking Commands

1.2 Software
Operating System, Command Prompt

1.3 Theory
IPCONFIG
When this command is issued it displays the following information in an easily readable
format that allows you to evaluate whether or not the network adapter is being assigned
the necessary information:
Connection specific DNS Suffix: (usually blank)
IP Address. (IP Address assigned to the active network adapter)
Subnet Mask. : 255.255.255.255
Default Gateway : 10.120.62.128
The important information here is that your device is assigned an IP Address and a De-
fault Gateway.

IPCONFIG/ALL
The usage of the ALL argument instructs IPCONFIG to display more detailed informa-
tion regarding the active network adapters features:
Windows IP Configuration:
(Note: The values listed in the Windows IP Configuration section are not relevant to
tethering.)
Host Name. . . (Machine’s Host Name)

1
Primary DNS Suffix isp.com
Node Type...... Hybrid
IP Routing Enabled...... No
WINS Proxy Enabled...... No
DNS Suffix Search Lists...... isp.com
(note: If not tethering or using PC card, these values may be different) PPP adapter
(GPRS Connection Name):
Connection pecific DNS Suffix: (usually blank) Description WAN (PPP/SLIP) Interface
Physical Address...... (MAC address of the active device)
DHCP Enabled...... Yes (Will be No if using Dialup Networking connection)

PING
The PING command is used to establish whether or not there is connectivity from the
active network adapter to a given URL or IP.
When run it returns the following information:
The IP of the URL/IP that you specified.
The number of bytes in each packet sent. (The default is 32 bytes.) Example: PING
www.google.com
Ping should be your first stop for network troubleshooting. Ping is useful for determining
whether or not a customer can access a site and how long packets of data take to make
the trip. Using this tool you can discover if packets are being lost in transit, how long
they are taking.

NETSTAT
The NETSTAT command displays protocol statistics and current TCP/IP network con-
nections. When run it returns the following information: Which ports are enabled for
TCP traffic Which ports are enabled for UDP traffic Which ports are listening for traf-
fic Which ports have established an active session Example: NETSTAT a NETSTAT is
extremely useful in discovering if the network adapter’s access to the internet through
standard ports such as 21, 25, 80, etc are blocked or disabled possibly indicating that
there is a firewall preventing data traffic.

NETSH
The NETSH command provides complete control over all network protocols installed in
Microsoft Windows.

When run it does the following: Resets TCP/IP stack.


Resolves inconsistencies within configuration of TCP/IP. Generates log of TCP/IP con-
figuration settings and changes. Example: NETSH intip reset resetlog.txt
NETSH is extremely useful in troubleshooting issues where a successful connection to the
internet is made using a wireless adapter but the computer is unable to access any web-
sites. After performing this command it is necessary to shutdown and restart Windows.

2
1.4 Conclusion
1. All commands tested successfully

3
Experiment 2

Configure a Network topology using


packet tracer Software

2.1 Aim
Configure a Network topology using packet tracer Software

2.2 Software
Operating System, Packet Tracer

2.3 Theory
Star Topology: In star Topology, multiple devices are connected to a central connection
point known as hub or switch. Devices are attached to the switch by using either copper
cable or fiber optic cable. Star networks provide a cost-effective method for sharing infor-
mation between different users. Star topology can be used in airline reservation counters
and small business offices where employees want an access to common applications and
files.

Basic Structure of Star Topology: Each device is connected point-to-point to a central


device which is either a hub or switch. Hub manages and controls all the functions of the
network. It also acts as a multi port repeater for the data flows. Hub is used to connect
segments of LAN and contains multiple ports. Hubs can be passive or active. Passive hubs
are used as a connection point which router all the traffic towards the devices. It does
not amplify or regenerate the signals. They simply take all of the packets they receive
on a single port and broadcast them across all the ports. Actives hubs contain electronic
circuits that regenerate and retransmit the information. Active have all of the features of
passive hubs, with the added feature of actually watching the data before being sent out.
Active hubs take a larger role in Ethernet communication by implementing a technology
called store and forward where the hubs actually look at the data they are transmitting
before sending it. Also it repairs certain “damaged” packets.

4
The basic structure of star topology is shown in figure.

Data passed through the hub before reaching the destination. For example, device A
wants to transmit data to device B. device A first sends data to the hub. If the hub is
passive, it broadcast the data to all the device in star network, except device A. each de-
vice has to read the address specified in data to determine if the data is intended foe that
device. If the address is different, then that data is discarded. If the address matches then
the data is received. If the hub is active, it regenerates the data before it is broadcasted.

A physical star network that used a central hub operates as per logical bus topology. The
hub broadcast data to all segments that thus uses a bus topology for transmission of data.
On the other hand, a physical star network using a switch functions as per logical star
topology. This is because the switch has a capacity to read the address mentioned in data
and to direct the data to the intended receiver.

Advantages and Disadvantages of star Topology: A star network required more


cable wires, but failure in any cable will affect only that particular device and are not the
entire LAN. Star network is easy to install and configure.

Advantages:
1. Easy to install, configure and manage
2. Easy to detect faulty device
3. Easier to expand
4. Connecting or removing devices does not the affect the network
5. Switch provides a centralized management
Disadvantages:
1. Increased devices causes traffic which makes the network slow
2. Requires more cable length than a linear topology
3. Hub failure leas to network failure
4. More expensive

5
2.4 Simulation

2.5 Conclusion
Topologies simulated successfully

6
Experiment 3

Build class A Class B Network using


router in packet tracer tools

3.1 Aim
Build class A Class B Network using router in packet tracer tools

3.2 Software
Cisco Packet Tracer

3.3 Theory
IP Address
A unique address mostly used by computers to communicate over a network that use IP
as its basic protocol is known as IP address. IP address is a unique number assigned to
any device operating on a network, for example, computer, routers, printers, internet fax
machine. Hence, an IP address is used to identify the devices in a network.

For example, IP address is 11000000.10101000.001010.00000001 in binary format but gen-


erally we donate in dotted decimal i.e. 192.168.42.1. Each of the decimal numbers in an
IP address is called octet. So, far the IP address 192.168.42.1, the first octet is 192, the
second octet is 168 and so on. The range of decimal number in each octet varies is form
0 to 255.

Generally, we do not assign an IO address to a computer rather we assign it for the inter-
face i.e. the Network Interface Card (NIC). So, if you have two NIC’s in your computer
than you have to assign two IP addresses for both NIC;s to communicate to the same or
two different network.

Dotted decimal notation of IP address:

7
To take the IP address easier to read and interpret, they are written in decimal format
where a point is separated by a byte. As each byte is 8-bit long, each number specified
by dotted decimal notation lies between 0 and 255, for example
Binary format 10000000. 00001011. 00000011. 00011111
Dotted decimal format 128. 11. 3. 31

IP Address Classes (IP Addressing):


IP address is divided into 5 classes:
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E

Class A
Class A consists of 8-bit network ID and 24-bit host ID as shown in figure

Class B
Class A consists of 16-bit network ID and 16-bit host ID as shown in figure

8
Class C
Class C addresses consists of 24 bits network ID and 8 bits host ID shown in figure

Class D
Class D address class is designed for multicasting. Each address in this defines a particular
group of host over this internet. This class of address consists of only one block of
address.

Class E
Class E address is reserved for future and experimental use. First byte of class E specifies
decimal values from 240 to 255.

Figure 3.1: Addressing schemes

3.4 Simulation Results


1. Select two Router, two Switch and four PCs.
2. Connect the as shown in figure below.
3. Configure two PCs with Class A IP address and remaining two PCs with class B IP
address.

9
Figure 3.2: IP Settings

Figure 3.3: Result

10
Experiment 4

Installation of Proxy-Server

4.1 Aim
To Install of Proxy-Server

4.2 Software
CC Proxy, Windows 7/8/10

4.3 Theory
Proxy Server
The proxy server acts as an intermediate server that relays requests between a client and
a server. The proxy server keeps track of all the client-server interactions, which allows
you to monitor exactly what is going on, without having to access the main server. The
proxy server evaluates the request according to its filtering rules. For example, it may
filter traffic by IP address or protocol. If the request is validated by the filter, the proxy
provides the resource by connecting to the relevant server and requesting the service on
behalf of the client.

We can use the proxy server to monitor all client-server interaction, regardless of the

Figure 4.1: Proxy server

11
communication protocol. For example, you can monitor the following protocols:

• HTTP for Web pages


• HTTPS for secure Web pages
• SMTP for email messages
• LDAP for user management

CCProxy setup
1. LAN networks configuration
CC Proxy only requires that the clients can ping through the server IP address. The IP
address of server that is used to connect with the other LAN client is called the proxy
server address.

2. Internet connection configurations


Special mention is that if the clients have been able to share the Internet, such as through
the router, and hope to use the CC Proxy to manage and control the clients’ Internet
access. You might need to do some changes on your hardware.
In this case, the clients can access the Internet directly with the Routers bypass proxy
server. That’s to say, CC Proxy cannot control the clients. We need to isolate the client
from Internet and force clients to access the Internet via the proxy server.
Configure the NAT or route settings in the router and block all LAN IP address accessing
the Internet directly except the server IP address.
Only some advanced routers have this function. Please do this with the router’s admin-
istrator.

3. Install CC Proxy on the Server

Figure 4.2: Proxy server

· Suppose the server IP address in the LAN is 192.168.0.1, and then 192.168.0.1 is the
proxy server address. Run ccproxysetup.exe and follow the on-screen instructions to in-
stall CC Proxy.
· Run CC Proxy on the server (Figure 3).
If you want to know more about server configurations, please read "Server Configuration".

12
If you get problem in launch CCProxy, please read "CCProxy Start Problem".

4. Add client’s IP into CCProxy


· Choose one computer in the LAN that needs to access the Internet. Suppose the IP
address of the computer is 192.168.0.2.
· Open CCProxy main window, click "Account" button, then popup "Account Manager"
dialog box.
· Select "Permit Only" in "Permit Category" and select "IP Address" in "Auth Type"
(Figure 4).
· Click "New" button, fill "192.168.0.2" in the "IP Address/IP Range", click "Save" and
"OK" button (Figure 5, Figure 6).

13
Experiment 5

Installation of Mail-Server

5.1 Aim
Installation of Mail-Server using MTA

5.2 Software
Ubuntu Linux OS, MTA.

5.3 Theory
A mail server also known as a mail transfer agent or MTA, a mail transport agent, a
mail router or an Internet mailer, is an application that receives incoming e-mail from
local users (people within the same domain) and remote senders and forwards outgoing
e-mail for delivery. A computer dedicated to running such applications is also called a
mail server. Microsoft Exchange, qmail, Exim and sendmail are among the more common
mail server programs.
The mail server works in conjunction with other programs to make up what is some-
times referred to as a messaging system. A messaging system includes all the applications
necessary to keep e-mail moving as it should. When you send an e-mail message, your
e-mail program, such as Outlook or Eudora, forwards the message to your mail server,
which in turn forwards it either to another mail server or to a holding area on the same
server called a message store to be forwarded later. As a rule, the system uses SMTP
(Simple Mail Transfer Protocol) or ESMTP (extended SMTP) for sending e-mail, and
either POP3 (Post Office Protocol 3) or IMAP (Internet Message Access Protocol) for
receiving e-mail

Postfix
Postfix is the default Mail Transfer Agent (MTA) in Ubuntu. It attempts to be fast and
easy to administer and secure. It is compatible with the MTA sendmail.

Installation
To install postfix run the following command: sudo apt-get install postfix Simply press
return when the installation process asks questions, the configuration will be done in

14
greater detail in the next stage.

Configuring SASL:

socket listen
{ # master {\\
# Master socket provides access to userdb information . It ' s typically #
used to give Dovecot ' s local delivery agent access to userdb so it #
can find mailbox locations .\\
# path = / var / run / dovecot / auth - master # mode = 0600\\
# Default user / group is the one who started dovecot - auth ( root ) # user =\\
# group \\
= #}\\
client {\\
# The client socket is generally safe to export to everyone . Typical use #
is to export it to your SMTP server so it can do SMTP AUTH lookups #
using it .\\
path = / var / spool / postfix / private / auth - client mode = 0660\\
user = postfix group = postfix \\
}\\
}\\
In order to let Outlook clients use SMTPAUTH , in the auth default section
of / etc / dovecot / dovecot . conf add " login ":\\
mechanisms = plain login \\
Once you have Dovecot configured restart it with : sudo / etc / init . d / dovecot
restart \\

Listing 5.1: Ubuntu Commands for SAIL config

5.4 Conclusion
Mail Server created successfully

15
Experiment 6

Installation of Web-Server

6.1 Aim
Installation of Web-Server

6.2 Software
Ubuntu, APACHE

6.3 Theory
Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP
address and possibly a domain name. For example, if you enter the URL http://www.ieee.com/index.htm
in your browser, this sends a request to the Web server whose domain name is ieee.com.
The server then fetches the page named index.html and sends it to your browser.

Any computer can be turned into a Web server by installing server software and con-
necting the machine to the Internet. There are many Web server software applications,
including public domain software from NCSA and Apache, and commercial packages from
Microsoft, Netscape and others. Windows 2000 and NT are popular choices for Web server
OS’s. They offer a familiar interface for IT managers and can be easier to install and set
up than Unix Web servers.
Apache - HTTP Web Server

In this practical we are going to install XAMPP which is free and open source cross-
platform web server solution stack package, consisting mainly of the Apache HTTP Server,
MySQL database, and interpreters for scripts written in the PHP and Perl programming
languages. These links will help you install Apache, use Apache, and find other Apache
developers.

16
LAMP is one of the most common web hosting platforms on the Internet, so it’s a great
environment to build and test your website. Follow these step by step instructions to
install and configure LAMP on Ubuntu 12.04. If you have a reasonably fast broadband
connection, you should be done in less than half an hour.
Install LAMP on Ubuntu

The developers at Ubuntu have made it really easy to install and configure the packages
for LAMP with a single terminal command. So open up a terminal window and let’s get
started. sudo apt-get install lamp-server

The apt package manager will now show the packages to be installed and ask for confir-
mation. Hit <Enter> to confirm and continue with the install.

Install LAMP packages

After some time downloading packages, you will be prompted to set a password for the
root user for MySQL.
Set MySQL root password

Enter the password you want to use for MySQL. Do not leave it blank. You’ll be prompted
a second time to confirm your password.
Confirm MySQL root password

After confirming your password, apt will continue installing the remaining packages. Re-
maining LAMP package installation Your LAMP installation is now complete.

Test Apache

Open a web browser window and enter the address http://localhost/. You should see a
web page that says "It Works!"
Test php

Now that you’ve confirmed that the Apache web server works, you want to make sure that
your php installation is working. To do that you need to create a file in /var/www called
testing.php. You can use your favorite text editor as root, or you can use the following
terminal command:
echo "<?phpphpinfo(); ?>" | sudo tee /var/www/testing.php
After that you need to restart the Apache web server. sudo service apache2 restart
Go back to your web browser and enter the address http://localhost/testing.php/ and
you should see a page displaying information about your php installation.

17
Configure MySQL

Since this tutorial is for setting up a local web development environment, the MySQL
needs to be bound to the localhost IP address. By default this should be 127.0.0.1 on
your system. Just in case, you can verify it with these commands. cat /etc/hosts |
greplocalhost
You should see something like 127.0.0.1 localhost :: 1 ip6-localhost ip6-loopback
You now want to verify that you have the correct bind address in MySQL’s my.cnf file.
cat /etc/mysql/my.cnf | grep bind-address You should see: bind-address = 127.0.0.1
If the bind address doesn’t match the one set for localhost on your system, you’ll need to
edit /etc/mysql/my.cnf as root to correct it.

Installing phpMyAdmin

You don’t need to install phpMyAdmin, but unless you’re a wizard with SQL, you’ll want
it to do administrative tasks on your MySQL databases. You can install phpMyAdmin
with this terminal command:
sudo apt-get install libapache2-mod-auth-mysql phpmyadmin
You’ll be prompted to confirm that you want to install the packages. Hit <Enter> to
continue.

Install phpMyAdmin packages

You’ll next be prompted to select a web server to configure with phpMyAdmin. This is
important! Use the arrow keys on your keyboard to highlight apache2 and then used the
space bar to select it. Then hit <Enter> to continue. Make sure to click the picture
below to see it in full size:

6.4 Conclusion
Web Server created successfully.

18

You might also like